2,113
Views
25
CrossRef citations to date
0
Altmetric
Current Development Papers

The art of trolling law enforcement: a review and model for implementing ‘flame trolling' legislation enacted in Great Britain (1981–2012)

Pages 301-318 | Received 16 Nov 2012, Accepted 13 Apr 2013, Published online: 05 Jul 2013

References

  • Akdeniz, Y. 1997. “Governance of Pornography and Child Pornography on the Global Internet: a Multi-layered Approach.” Law and the Internet: Regulating Cyberspace 223–241.
  • Barlow, J.P. 1996. A Declaration of the Independence of Cyberspace. San Francisco, CA: Electronic Frontier Foundation.
  • Bishop, J. 2008. “Increasing Capital Revenue in Social Networking Communities: Building Social and Economic Relationships Through Avatars and Characters.” In Social Networking Communities and Edating Services: Concepts and Implications, edited by C. Romm-Livermore and K. Setzekorn. Hershey, PA: IGI Global.
  • Bishop, J. 2010. “Tough on Data Misuse, Tough on the Causes of Data Misuse: A Review of New Labour's Approach to Information Security and Regulating the Misuse of Digital Information (1997–2010).” International Review of Law, Computers & Technology 24 (3): 299–303. doi: 10.1080/13600869.2010.522336
  • Bishop, J. 2011. “All's WELL that ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom.” In Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices edited by A. Dudley-Sponaugle and J. Braman. Hershey, PA: IGI Global.
  • Bishop, J. 2012a. “The Psychology of Trolling and Lurking: The Role of Defriending and Gamification for Increasing Participation in Online Communities Using Seductive Narratives.” In Virtual Community Participation and Motivation: Cross-Disciplinary Theories, edited by H. Li. Hershey, PA: IGI Global.
  • Bishop, J. 2012b. “Scope and Limitations in the Government of Wales Act 2006 for Tackling Internet Abuses in the Form of ‘Flame Trolling’.” Statute Law Review 33 (2): 207–216. doi: 10.1093/slr/hms016
  • Bishop J. 2012c. “Taming the Chatroom Bob: the Role of Brain-Computer Interfaces that Manipulate Prefrontal Cortex Optimization for Increasing Participation of Victims of Traumatic Sex and Other Abuse Online.”.
  • Bishop J. 2012d. Tackling Internet abuse in Great Britain: Towards a framework for classifying severities of ‘flame trolling’. In The 11th International Conference on Security and Management (SAM'12), 16–19 July 2012, Las Vegas, USA.
  • Bishop, J. 2013. The effect of deindividuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater. International Journal of Cyber Criminology 7(1): 28–48.
  • Bishop, J. In Press. Representations of ‘trolls’ in mass media communication: A review of media-texts and moral panics relating to ‘Internet trolling.’ International Journal of Web Based Communities.
  • Bryce, T., M. Nellis, A. J. Corrigan, H. Gallagher, P. Lee, and H. Sercombe 2010. “Biometric Surveillance in Schools: Cause for Concern or Case for Curriculum?” Scottish Educational Review 42 (1): 3–22.
  • Carroll, J. M. 2009. “Conceptualizing a Possible Discipline of Human-Computer Interaction.” Interacting with Computers 22 (1).
  • Datta, P., and W. Acar 2010. “Software and Human Agents in Knowledge Codification.” Knowledge Management Research & Practice 8 (1): 45–60. doi: 10.1057/kmrp.2009.34
  • Downes, D. “Toughing it Out: From Labour Opposition to Labour Government.” Policy Studies 19 (3-4): 191–198. doi: 10.1080/01442879808423754
  • Driscoll, C., and M. Gregg 2008. “Broadcast Yourself: Moral Panic, Youth Culture and Internet Studies.” Youth Media in the Asia Pacific Region 71–86.
  • Ellis, S., and C. Oppenheim 1993. “Legal Issues for Information Professionals, Part III: Data Protection and the Media—Background to the Data Protection Act 1984 and the EC Draft Directive on Data Protection.” Journal of Information Science 19 (2): 85–97. doi: 10.1177/016555159301900201
  • Gavison, R. 1979. “Privacy and the Limits of Law.” Yale Law Journal 89: 421 doi: 10.2307/795891
  • Goel, A. K., G. R. Sharma, and R. Rastogi 2010. “'Knowledge Management Implementation in NTPC: an Indian PSU.” Management Decision 48 (3): 383–395. doi: 10.1108/00251741011037756
  • Guichard, A. 2009. “Hate Crime in Cyberspace: The Challenges of Substantive Criminal Law.” Information & Communications Technology Law 18 (2): 201–234. doi: 10.1080/13600830902814919
  • Hills, J. 1989. “Neo-Conservative Regimes and Convergence in Telecommunications Policy.” European Journal of Political Research, Vol. 17, 1, 95–113.
  • Jansen, E., and V. James 1995. NetLingo: The Internet Dictionary. Netlingo Inc.
  • Jansen, E., and V James 2002. NetLingo: The Internet Dictionary. Netlingo Inc.
  • Kuipers, G. 2006. “The Social Construction of Digital Danger: Debating, Defusing and Inflating the Moral Dangers ff Online Humor and Pornography in the Netherlands and the United States.” New Media & Society 8 (3): 379 doi: 10.1177/1461444806061949
  • Lessig, L. 1999. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (2): 501–549. doi: 10.2307/1342331
  • Phillips, W. 2011. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16 (12–5).
  • Robertson, R. 2006. “The Increasing Monopolization of Identity by the State: The Case of the UK and the US.” Nationalism and Ethnic Politics 12 (3): 373–387. doi: 10.1080/13537110600882601
  • Segell, G. M. 2007. “Reform and Transformation: the UK's Serious Organized Crime Agency.” International Journal of Intelligence and CounterIntelligence 20 (2): 217–239. doi: 10.1080/08850600601079941
  • Starmer, K. 2013. Guidelines on prosecuting cases involving communications sent via social media. London, UK: Crown Prosecution Service.
  • Tan, L. M., and M. Newman 1991. “Computer Misuse and the Law.” International Journal of Information Management 11 (4): 282–291. doi: 10.1016/0268-4012(91)90047-G
  • Wall, D. S. 2007. “Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace.” Police Practice and Research 8 (2): 183–205. doi: 10.1080/15614260701377729
  • Walter, T., R. Hourizi, W. Moncur, and S. Pitsillides 2011. “Does the Internet Change how we Die and Mourn? An Overview.” Omega: Journal of Death & Dying 64 (4): 12 doi: 10.2190/OM.64.4.a
  • Whine, M. 1997. “The Far Right on the Internet.” The Governance of Cyberspace: Politics, Technology, and Global Restructuring, 209–27. Oxford: Hart Publishing.
  • Zhao, Z., S. Feng, Q. Zeng, J. Fan, and X. Zhang 2010. “Personalized Knowledge Acquisition Through Interactive Data Analysis in E-learning System.” Journal of Computers 5 (5): 709 doi: 10.4304/jcp.5.5.695-702

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.